From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Models of Privacy Preserving Traffic Tunneling., и . Simulation, 85 (9): 589-607 (2009)Preventing encrypted traffic analysis. University of Illinois Urbana-Champaign, USA, (2011)A Secure Cloud with Minimal Provider Trust., , , , , , , , , и 5 other автор(ы). HotCloud, USENIX Association, (2018)Website Detection Using Remote Traffic Analysis., , , и . Privacy Enhancing Technologies, том 7384 из Lecture Notes in Computer Science, стр. 58-78. Springer, (2012)Bootstrapping and maintaining trust in the cloud., , , , и . ACSAC, стр. 65-77. ACM, (2016)Supporting Security Sensitive Tenants in a Bare-Metal Cloud., , , , , , , , , и 1 other автор(ы). USENIX Annual Technical Conference, стр. 587-602. USENIX Association, (2019)Performance Analysis of Real Traffic Carried with Encrypted Cover Flows., и . PADS, стр. 80-87. IEEE Computer Society, (2008)Leveraging Data Provenance to Enhance Cyber Resilience., , , , , , , , , и . SecDev, стр. 107-114. IEEE Computer Society, (2016)Retrofitting Applications with Provenance-Based Security Monitoring., , , , , , и . CoRR, (2016)Website Detection Using Remote Traffic Analysis, , , и . CoRR, (2011)